• How Spammers Use Colocation Facilities to Get To You

    Written by: Francesco Trama | Published on: April 20th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Colocation facilities can be a controversial subject. They provide reliable hosting for companies that can’t afford or don’t want to invest in their own server, but spammers can also use them to get around the traditional Advanced-IP filters that protect companies and individuals from spam. As a network security administrator, you need to understand how … Continue reading >>>

  • Ransomware: How Snail Mail and Low Demands Could Mean Big Losses for Healthcare

    Written by: Francesco Trama | Published on: April 18th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    A healthcare employee opens an email that looks important and clicks on the link. He goes about his day, only to return to see a message on his screen telling him all files on the system are now locked. Even worse, if he doesn’t pay a ransom within 48 hours, those files will be deleted … Continue reading >>>

  • The Opportunities and Dangers of High-Tech Health Care

    Written by: Francesco Trama | Published on: April 15th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Did you know that a revolution is taking place in healthcare? Institutions are connecting up all their equipment to improve communication and speed up the delivery of results to patients and doctors. Although increasing connectivity improves the patient experience, it also presents security risks because there are more points in your network where a hacker … Continue reading >>>

  • Blinded By Logging Alerts? Here’s How to See Again

    Written by: Francesco Trama | Published on: April 13th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    The ability to log network traffic is a huge benefit to network security administrators. Logging systems allow admins to view and analyze activity on their networks, which means they can quickly identify security threats and take action to neutralize them. If you need to protect your network from external threats, then logging and alerts could … Continue reading >>>

  • How Next-Gen Advanced Ip  Filtering is Helping Healthcare Institutions Increase Security

    Written by: Francesco Trama | Published on: April 11th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Today’s healthcare institutions are facing tremendous challenges as they continue to adopt the latest technologies in patient management and care. One of the key issues included in this new set of technology challenges is the issue of security. Maintaining patient and employee privacy, as millions of sensitive data points now exist on servers and in … Continue reading >>>

  • Threat Monitoring Isn’t A Cure-All-Fix-All

    Written by: Francesco Trama | Published on: April 7th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Threat Detection services and systems are a lot like an antivirus program. How so? It’s built on the history of what we know, and to some degree provides a “good guess” of what potential some traffic may accomplish. This is also known as false-positives. So does it protect you from all harm to your network, … Continue reading >>>

  • Three Important Aspects of Healthcare Security

    Written by: Francesco Trama | Published on: March 29th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    While there are many aspects to healthcare security, there are some key areas where vulnerabilities must be addressed. As the healthcare industry works rapidly to adopt electronic records, there are many changes taking place. Many of the changes will ultimately lead to a more secure environment that is better positioned to protect patient and employee … Continue reading >>>

  • Healthcare IT: A Myriad of Underaddressed Security Concerns

    Written by: Francesco Trama | Published on: March 24th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    While security is important to all industries, Healthcare should be one of the most carefully guarded given that it is one of the most attractive to attackers. Data in this space is like an endless buffet to cybercriminals because of its quality and amount. Consider the data that your own Healthcare provider has on you … Continue reading >>>

  • Big Brother is Watching. Here’s How to Stop Them.

    Written by: Francesco Trama | Published on: March 9th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Keeping your network safe from the typical cyber attacker is difficult enough, but what happens when the entity who wants to infiltrate your network is more than the average cybercrime? What happens when your organization becomes the target of an entire government? It sounds crazy, but state-sponsored espionage is a very real threat, which can … Continue reading >>>

  • How to Protect a Against State Sponsored Hackers

    Written by: Francesco Trama | Published on: March 3rd, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Cybercrime is a daily occurrence. Everywhere you look, you hear about businesses small and large being hacked. But what, exactly, does this entail? And how can your company guard against it? First, to understand how hacking works, let’s take a look at the three basic types of hackers.  Three Types of Hackers High School Hackers: … Continue reading >>>

  • CyberPatriot: Developing Talent to Solve Tomorrow’s Cybersecurity Challenges

    Written by: Francesco Trama | Published on: February 19th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    We were thrilled to host students from Riverview High School at PacketViper Headquarters a few weeks ago for the state level of the National Youth Cyber Defense Competition. PacketViper is proud to support the students of Riverview High School and their teacher, Dr. Michael McNally, in this prestigious, nationally recognized Network Security Competition.  In cooperation … Continue reading >>>

  • How to Guard Against Advanced Persistent Threats

    Written by: Francesco Trama | Published on: February 18th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    When it comes to network security, there are a number of different types of threats to be aware of. Among the most detrimental are the Advanced Persistent Threats (APTs), which according to Wikipedia’s definition are “An advanced persistent threat is a set of stealthy and continuous computer hacking processes, which target a specific entity. That … Continue reading >>>

  • The Vast Cybersecurity Threat to the Internet of Things

    Written by: Francesco Trama | Published on: February 16th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    The Internet of Things (IoT) is a term for physical objects that are connected to a network and can communicate or be controlled using computers, mobile devices, etc. Televisions, cars, and air conditioners are among the many appliances that can be controlled by a smartphone. There are even WiFi-enabled connectors available, to allow you to … Continue reading >>>

  • Lowering Costs to Increase Network Security. Myth or Reality?

    Written by: Francesco Trama | Published on: February 9th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    While there are different methods for pricing network security products, the market has shifted toward the adoption of the usage based pricing model. In this case (as you are likely to be extremely familiar with), your costs depends on the level of traffic to your network – whether that traffic is wanted or unwanted. These … Continue reading >>>

  • Connection-based DDoS is less Impactful with a Advanced Ip Layer

    Written by: Francesco Trama | Published on: January 26th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    There are a number of different types of cyber-attacks that can cripple your network if you’re not careful. For instance, a Denial of Service (DoS) attack floods the network with more traffic than it can handle, in order to bring it down. Even more harmful is a Distributed Denial of Service (DDoS) attack. After gaining … Continue reading >>>

  • Why a Next-Gen Advanced Ip  Layer Is Now More Important than Ever

    Written by: Francesco Trama | Published on: January 19th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Up until recently, an Advanced Ip  layer was not considered to be a viable method of protection against cyberattacks. In the past, people made attempts at Advanced Ip  filtering, but it was ultimately ineffective. Blocking IP addresses based on their country of origin can eliminate some threats, but not all of them. Previous attempts resulted in blocking legitimate … Continue reading >>>

  • How to Choose a Security Vendor for a Positive Long-Term Relationship

    Written by: Francesco Trama | Published on: January 18th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    What do you look for when shopping for a security vendor? There are a number of factors to consider, and a number of criteria to keep in mind. You may want a vendor that works well in tandem with additional products; or, you may want a single, overarching vendor that covers your entire environment. Whatever … Continue reading >>>

  • Don’t Ignore These Three Network Security Vulnerabilities

    Written by: Francesco Trama | Published on: January 14th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    How secure is your network? It’s never as secure as you think. No matter how sophisticated your firewall is, or how much protection you have against cyberattacks, you still have some cyber vulnerabilities in your system. After all, the attackers have you beaten by sheer numbers. They can bombard your network with tens of thousands … Continue reading >>>

  • Education: Don’t Fail to Layer Network Security With Geo-IP

    Written by: Francesco Trama | Published on: January 11th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    What kind of organizations are among the most at risk for cyberattacks? Banks and financial institutions? Software developers and tech firms? Perhaps, but one of the biggest victims is one you might not think about: schools and educational institutions. You might not realize it, but schools are a prime target for network security breaches, and … Continue reading >>>

  • How to Do More with Less: Increase Cybersecurity,More Budget

    Written by: Francesco Trama | Published on: January 8th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Cybersecurity is a major factor in any company. To keep yourself protected, it’s important to dedicate as many resources as possible towards keeping potential threats at bay. However, the sheer volume of potential threats that your network faces every day means that your entire cybersecurity budget can be spent simply analyzing them to see if … Continue reading >>>

  • Threat Detection: Is it a False Sense of Security?

    Written by: Francesco Trama | Published on: January 7th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    When it comes to cybersecurity, there’s a myriad of potential threats to deal with, from viruses to malware to Trojans and more. Today’s threat detection systems deal with those attacks by focusing mainly on history. What does that mean? It means that threat detection is based on what the system knows. And what it knows … Continue reading >>>

  • It’s Time to Cut Costs on Network Security Equipment

    Written by: Francesco Trama | Published on: January 4th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    The last major innovation in firewall protection was from (what was then) a small company called Palo Alto, around 10 years ago. Cybersecurity hasn’t changed much since then. Cyberattacks, however, are becoming more relentless and more sophisticated. How can you keep them at bay, without breaking the bank on network security? Advanced-IP filtering can keep your network … Continue reading >>>

  • Stop Cyber Attacks by Adding More In-Depth Defense

    Written by: Francesco Trama | Published on: December 10th, 2015

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Protecting your network against cyber attacks is one of the most important tasks your IT team has. You can never have too much defense against potential threats, right? While it’s true that security is essential, your methods of defense can also be a double edged sword. How? Let’s take a look. Finding a Balance of … Continue reading >>>

  • How Advanced Ip Filtering Can Protect HealthCare Data

    Written by: Francesco Trama | Published on: December 9th, 2015

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Healthcare organizations, from hospitals to doctors’ offices to insurance offices and more, are prime targets for cyber attacks. If the motivation is to obtain and sell individual private data, healthcare systems provide a number of potential targets that are appealing to cyber attackers, including: Private data Medical devices (connected to the Internet of Things and … Continue reading >>>

  • What can Advanced Ip Filtering Improve for You.

    Written by: Francesco Trama | Published on: November 25th, 2015

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Cybersecurity is really just a numbers game—and the numbers are stacked in favor of the cybercriminals. Every day, the average company is subjected to hundreds, even thousands of attempts to penetrate their security system. Your security team doesn’t have the time or the resources to deal with each one individually. You have your firewall to … Continue reading >>>

  • Network Security Is Weaker Without a Advanced-Ip Layer

    Written by: Francesco Trama | Published on: November 24th, 2015

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    What’s the purpose of firewall? It inspects, blocks, alerts, and logs everything that tries to get to the system it protects. Cybercriminals try every day to break through corporate firewalls, in order to infect the company with malware or Trojans that can confiscate company IP and lead the perpetrator to sensitive company data. If it … Continue reading >>>

  • Why Is Your Network Security Failing You?

    Written by: Francesco Trama | Published on: November 23rd, 2015

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    How secure is your organization’s network? Take a minute to think about it. You have firewalls in place. You have regular network security inspections that analyze the strength of your network security and show you where it’s vulnerable, so that you can fix it. The results show you that you’re protected! What do you have … Continue reading >>>

  • As always, Senior Management ruins any kind of security measure

    Written by: Francesco Trama | Published on: November 14th, 2015

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    I read this article on Softpedia titled “63 Percent of Companies Run Cyber-Security Drills”. The bulk of the article discussed how more than half of the respondents companies perform cyber security drills. While I do not question the accuracy of the percentage, I do question the types of drills performed, frequency, and bias of those … Continue reading >>>

  • How Advanced Ip  Filtering Could Prevent the Next CCTV Breach

    Written by: Francesco Trama | Published on: November 5th, 2015

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Last week, news broke of a recent DDOS attack using IPs belonging to CCTV cameras. The story, which originated on the Incapsula blog, describes a botnet including approximately 900 CCTV cameras – some of which were located nearby the Incapsula offices. As Incapsula emphasizes in their blog post, this attack isn’t terribly surprising or uncommon, … Continue reading >>>

  • Why it is Difficult to get Past an Advanced-Ip Layer

    Written by: Francesco Trama | Published on: November 3rd, 2015

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    If I had a nickel for every time I’ve heard the following statement, I’d be retired on a private island by now: “Proxies/Bots can defeat Advanced Ip Filtering.” This is the go-to argument in the network security industry, and has been for quite some time. The fact of the matter is that this is true … Continue reading >>>